User Tools

Site Tools


This is an old revision of the document!

MAC Address Randomization

IWD has supported randomizing the adapters MAC address on startup for quite some time, but this only randomizes the address once for the lifetime of IWD. In the 1.6 release address randomization on a per-network basis was added. Enabling this can be done inside IWD's main config file (default /etc/iwd/main.conf):

# main.conf

This option was added to AddressRandomization but truthfully this is not random. The MAC address is generated using a SHA256 digest from the permanent adapters address and the SSID being connected to. This is a deterministic operation which will allow the same MAC to be used on every connection to a given SSID. Generally this is the behavior the average user wants. For fully randomized MAC addresses see AlwaysRandomizeAddress.


The (AlwaysRandomizeAddress) option was added to network provisioning files. Its value only takes effect when AddressRandomization is set to network. When enabled the MAC address is randomized on each connection to a network in a non-deterministic fashion. To the access point it will appear as if a brand new client is connecting every time.


The (AddressOverride) option was added to network provisioning files. Its value only takes effect when AddressRandomization is set to network. When enabled the MAC address will be set to this value when connecting to the network that the provisioning file dictates, and only for this network.

# /var/lib/MySSID.psk


The networking subsystem has several caveats which limit the efficiency of MAC address randomization, as well as introduce potential race conditions. Both of these shortfalls come down to the fact that the adapter must be powered down to change the MAC address.

The time cost

During testing it was found that it takes at least 300ms to power the adapter down, change the MAC, and power it back up. Since these new options were added on a per-network basis this delay more or less triples IWD's average connection time. This is a problem with any software using the RTNL subsystem for operations like this. There is even a note in the Android (documentation):

Note: You may experience up to a three-second delay when connecting to a network due to the driver flushing saved scan results when the interface goes down. If this is the case, check with your silicon partners to resolve the issue.

We have only measured this delay on a few cards, so its not out of the question that some cards may have a much longer delay. If you are seeing excessive delays we ask you to reach out on the mailing list or IRC.

Race conditions

Since IWD is asynchronous and it takes some time to complete a MAC address change there is a potential for race conditions. This is an unfortunate consequence of the way RTNL was designed, at least in terms of powering the adapter. We have identified two potential race conditions which are unlikely to ever happen, but still possible. These scenarios involve an external process doing operations on the interface IWD manages.

Scenario #1

IWD                   RTNL           External Process
 |                      | <--------- Power Down |
 | Power Down --------> |                       |
 | Success <----------- | ---------> Success    |
 |                      |                       |
 | Change MAC --------> |                       |
 | Success <----------- |                       |
 |                      |                       |
 | Power Up ----------> |                       |
 | Success <----------- |                       |

In the above example an external process brought the interface down just before IWD did. RTNL does not consider two down operations an error so it returns success on both. IWD does get a notification that the interface went down, but assumes this was its own doing. The MAC change operation continues and ultimately the interface is brought back up. To the external process (e.g. a user doing ifconfig wlan0 down) it would appear as if their command had no effect as the interface would still be in an up state.

addressrandomization.1585327603.txt.gz · Last modified: 2020/03/27 16:46 by James Prestwood